MCTS Guide to Microsoft Windows 7 Chapter 7 Windows 7 Security Features.

Slides:



Advertisements
Similar presentations
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 7: Troubleshoot Security Settings and Local Security.
Advertisements

Securing. Agenda  Hard Drive Encryption  User Account Permissions  Root Level Access  Firewall Protection  Malware Protection.
Chapter 10 Securing Windows Server 2008 MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration.
Chapter 13 Securing Windows Server 2008
Configuring Windows Vista Security Chapter 3. IE7 Pop-up Blocker Pop-up Blocker prevents annoying and sometimes unsafe pop-ups from web sites Can block.
Hands-On Microsoft Windows Server 2003 Administration Chapter 4 Managing Group Policy.
Chapter 6: Configuring Security. Options for Managing Security Configurations LGPO (Local Group Policy Object) –Used if Computer is not part of a domain.
11 SUPPORTING LOCAL USERS AND GROUPS Chapter 3. Chapter 3: Supporting Local Users and Groups2 SUPPORTING LOCAL USERS AND GROUPS  Explain the difference.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Hands-On Microsoft Windows Server 2003 Administration Chapter 5 Administering File Resources.
Chapter 6: Configuring Security. Group Policy and LGPO Setting Options Software Installation not available with LGPOs Remote Installation Services Scripts.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 10: Server Administration.
Maintaining and Updating Windows Server 2008
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
1 Chapter Overview Managing Compression Managing Disk Quotas Increasing Security with EFS Using Disk Defragmenter, Check Disk, and Disk Cleanup.
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
70-270: MCSE Guide to Microsoft Windows XP Professional Chapter 5: Users, Groups, Profiles, and Policies.
Securing Windows Servers Using Group Policy Objects
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Hands-On Microsoft Windows Server 2008 Chapter 10 Securing Windows Server 2008.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Troubleshoot Access, Authentication, and User Account Control Issues Lesson 8.
Windows Server 2008 Chapter 10 Last Update
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory Chapter 9: Active Directory Authentication and Security.
September 18, 2002 Introduction to Windows 2000 Server Components Ryan Larson David Greer.
Using Windows Firewall and Windows Defender
Networking Security Chapter 8 powered by dj. Chapter Objectives  Explain various security threats  Monitor security in Windows Vista  Explain basic.
Microsoft ® Official Course Module 8 Securing Windows 8 Desktops.
Hands-On Microsoft Windows Server 2008
Managing User Accounts, Passwords and Logon Chapter 5 powered by dj.
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
Week #7 Objectives: Secure Windows 7 Desktop
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
C HAPTER 6 NTFS PERMISSIONS & SECURITY SETTING. INTRODUCTION NTFS provides performance, security, reliability & advanced features that are not found in.
Troubleshooting Windows Vista Security Chapter 4.
MCTS Guide to Microsoft Windows Vista Chapter 7 Windows Vista Security Features.
Fall 2011 Nassau Community College ITE153 – Operating Systems Session 22 Local Security Polcies 1.
Module 14: Configuring Server Security Compliance
Section 1: Introducing Group Policy What Is Group Policy? Group Policy Scenarios New Group Policy Features Introduced with Windows Server 2008 and Windows.
Module 7: Fundamentals of Administering Windows Server 2008.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Module 3 Configuring File Access and Printers on Windows ® 7 Clients.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 7 Windows 7 Security Features.
Section 11: Implementing Software Restriction Policies and AppLocker What Is a Software Restriction Policy? Creating a Software Restriction Policy Using.
Module 3 Configuring File Access and Printers on Windows 7 Clients.
Guide to MCSE , Second Edition, Enhanced1 The Windows XP Security Model User must logon with: Valid user ID Password User receives access token Access.
Module 3: Configuring File Access and Printers on Windows 7 Clients
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 11: Managing Access to File System Resources.
Troubleshooting Security Issues Lesson 6. Skills Matrix Technology SkillObjective Domain SkillDomain # Monitoring and Troubleshooting with Event Viewer.
Ch 17 Securing the File System. Three Ways to Protect Files NTFS Permissions Encrypting File Service BitLocker full-disk encryption – BitLocker ToGo.
Working with Users and Groups Lesson 5. Skills Matrix Technology SkillObjective DomainObjective # Introducing User Account Control Configure and troubleshoot.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory, Enhanced Chapter 11: Group Policy for Corporate Policy.
Module 7: Implementing Security Using Group Policy.
Managing Applications, Services, Folders, and Libraries Lesson 4.
Understand Encryption LESSON 2.5_A Security Fundamentals.
Lesson 18: Configuring Security for Mobile Devices MOAC : Configuring Windows 8.1.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 7 Windows 7 Security Features.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
Maintaining and Updating Windows Server 2008 Lesson 8.
Windows Vista Configuration MCTS : Network Security.
Windows Vista Configuration MCTS : NTFS Security Features and File Sharing.
ITMT Windows 7 Configuration Chapter 10 – Securing Windows 7
Configuring Windows Firewall with Advanced Security
Securing Windows 7 Lesson 10.
Preparing for the Windows 8. 1 MCSA Module 6: Securing Windows 8
Presentation transcript:

MCTS Guide to Microsoft Windows 7 Chapter 7 Windows 7 Security Features

Objectives Describe Windows 7 Security Improvements Use the local security policy to secure Windows 7 Enable auditing to record security events Describe and configure User Account Control Describe the malware security features in Windows 7 Use the data security features in Windows 7 Secure Windows 7 by using Windows Update MCTS Guide to Microsoft Windows 72

Windows 7 Security Improvements Major security improvements in Windows 7 are: –Malware protection –Easier deployment of alternative authentication methods –Enhanced network protection –Data protection for stolen hard drives –AppLocker for software restriction MCTS Guide to Microsoft Windows 73

Malware Protection Malware –Malicious software designed to perform unauthorized acts on your computer User Account Control (UAC) –Feature implemented in Windows 7 to control malware –Prompts users when software attempts to take administrative control Windows Defender –A real-time spyware monitor to prevent the installation of and remove spyware MCTS Guide to Microsoft Windows 74

Malware Protection (cont'd.) Spyware –A threat to privacy; makes systems unstable Internet Explorer has been modified to run in a limited state (protected mode) –User files cannot be modified A phishing filter has also been added –Prevents unauthorized Web sites from stealing log- on credentials and other personal information MCTS Guide to Microsoft Windows 75

Malware Protection (cont'd.) Windows service hardening –Most Windows exploits used to install malware are the result of flaws in Windows services –Windows services have been changed as follows: Each service is given a SID number Services run with a lower privilege level by default Unnecessary privileges for services have been removed Windows Firewall can control network access based on service SIDs Services are isolated and cannot interact with users MCTS Guide to Microsoft Windows 76

Alternative Authentication Methods Username and password –Most common method for authentication Windows 7 makes smart cards easier to manage Development of additional authentication methods for Windows, such as biometrics, has been simplified MCTS Guide to Microsoft Windows 77

Network Protection Windows 7 is protected on networks by: –Enhanced firewall –Network Access Protection (NAP) Firewall can control both inbound and outbound network packets NAP prevents unhealthy computers from accessing the network –An unhealthy computer is one that has outdated antivirus signatures or is missing security updates MCTS Guide to Microsoft Windows 78

Data Protection NTFS file system provides data protection by using permissions on files and folders –NTFS permissions can be easily circumvented when you have physical access to a computer BitLocker Drive Encryption –Encrypts the contents of a partition and protects the system partition MCTS Guide to Microsoft Windows 79

AppLocker for Software Restrictions AppLocker simplifies the management of software restrictions –By implementing simpler rules than were available in software restriction policies MCTS Guide to Microsoft Windows 710

Security Policies Windows 7 includes a local security policy –Can be used to control many facets of Windows –Can be accessed in the Local Security Policy in Administrative Tools Local security policy categories –Account policies –Local policies –Windows Firewall with Advanced Security –Network List Manager Policies –Public Key Policies MCTS Guide to Microsoft Windows 711

Security Policies (cont'd.) Local security policy categories (cont'd.) –Software Restriction Policies –Application Control Policies –IP Security Policies on Local Computer –Advanced Audit Policy Configuration The local security policy is part of a larger Windows management system called Group Policy –Can be implemented on a local computer, but is typically part of a domain-based network MCTS Guide to Microsoft Windows 712

Security Policies (cont'd.) MCTS Guide to Microsoft Windows 713

Account Policies Contain the password policy and the account lockout policy Do not affect domain accounts Must be configured at the domain level Password policy –Controls password characteristics for local user accounts –Available settings Enforce password history Maximum password age Minimum password age MCTS Guide to Microsoft Windows 714

Account Policies (cont'd.) Password policy (cont'd.) –Available settings (cont'd.) Minimum password length Password must meet complexity requirements Store passwords using reversible encryption Account lockout policy –Prevents unauthorized access to Windows 7 –Can configure an account to be temporarily disabled after a number of incorrect log-on attempts MCTS Guide to Microsoft Windows 715

Account Policies (cont'd.) Account lockout policy (cont'd.) –Available settings Account lockout duration Account lockout threshold Reset account lockout counter after MCTS Guide to Microsoft Windows 716

Local Policies Local policies are for: –Auditing system access –Assigning user rights –Configuring specific security options Auditing lets you track when users log on and which resources are used User rights control what system task a particular user or group of users can perform Specific security options are a variety of settings that can be used to make Windows 7 more secure MCTS Guide to Microsoft Windows 717

Local Policies (cont'd.) MCTS Guide to Microsoft Windows 718

Local Policies (cont'd.) User rights assignment settings –Allow log on locally –Back up files and directories –Change the system time –Load and unload device drivers –Shut down the system Security options settings –Devices –Interactive logon –Shutdown MCTS Guide to Microsoft Windows 719

AppLocker Used to define which programs are allowed or disallowed in the system Used in corporate environments where parental controls are not able to be used Enhancements over software restriction policies: –Rules can be applied to specific users and groups rather than all users –Default rule action is deny to increase security –Wizard to help create rules. –Audit only mode for testing that only writes events to the event log MCTS Guide to Microsoft Windows 720

AppLocker (cont'd.) MCTS Guide to Microsoft Windows 721

AppLocker (cont'd.) You can audit or enforce AppLocker rules –Relies on the configuration of appropriate rules and the Application Identity service Rule Collections –Executable –Windows Installer –Scripts –DLL MCTS Guide to Microsoft Windows 722

AppLocker (cont'd.) MCTS Guide to Microsoft Windows 723

AppLocker (cont'd.) Rule Permissions –Each rule contains permissions that define whether the rule allows or denies software the ability to run Rule Conditions –Define the software that is affected by the rule –Three conditions that can be used: Publisher Path File hash MCTS Guide to Microsoft Windows 724

AppLocker (cont'd.) MCTS Guide to Microsoft Windows 725

AppLocker (cont'd.) Rule Exceptions –Define software that the rule does not apply to MCTS Guide to Microsoft Windows 726

Other Security Policies Windows Firewall with Advanced Security –Used to configure the new firewall in Windows 7 –Lets you configure both inbound and outbound rules –Can be used to configure IP Security (IPsec) rules Network List Manager Policies control how Windows 7 categorizes networks Public Key Policies has a single setting for the Encrypting File System (EFS) IP Security Policies on Local Computer are used to control encrypted network communication MCTS Guide to Microsoft Windows 727

Security Templates Security templates are.inf files that contain: –Settings that correspond with the Account Policies and Local Policies in the local security policy –Settings for the event log, restricted groups, service configuration, registry security, and file system security Edited by using the Security Templates snap-in Security templates are used by Security Configuration and Analysis tool and Secedit MCTS Guide to Microsoft Windows 728

Security Templates (cont'd.) MCTS Guide to Microsoft Windows 729

Security Templates (cont'd.) Tasks you can perform with the Security Configuration and Analysis tool –Analyze –Configure –Export MCTS Guide to Microsoft Windows 730

Auditing –Security process that records the occurrence of specific operating system events in the Security log Every object in Windows 7 has audit events related to it Auditing is enabled through the local security policy or by using Group Policy Once the audit policy is configured –The audited events are recorded in the Security log that is viewed by using Event Viewer MCTS Guide to Microsoft Windows 731

Auditing (cont'd.) MCTS Guide to Microsoft Windows 732

MCTS Guide to Microsoft Windows 733

Auditing (cont'd.) MCTS Guide to Microsoft Windows 734

User Account Control User Account Control (UAC) –Feature introduced in Windows Vista that makes running applications more secure Security is enhanced by reducing the need to log on and run applications using administrator privileges When UAC is enabled and an administrative user logs on –Administrative user is assigned two access tokens Standard user privileges Administrative privileges MCTS Guide to Microsoft Windows 735

User Account Control (cont'd.) Standard user access token is used to launch the Windows 7 user interface Admin Approval Mode –Ensures that the access token with administrative privileges is used only when required Application Information Service –Responsible for launching programs by using the access token with administrative privileges MCTS Guide to Microsoft Windows 736

Application Manifest Application manifest –Describes the structure of an application –Includes required DLL files and whether they are shared Applications that are not designed for Windows 7 and which require administrative privileges –Do not properly request elevated privileges –Fix it by using the Application Compatibility Toolkit MCTS Guide to Microsoft Windows 737

UAC Configuration Windows 7 introduces a simplified interface for managing UAC UAC is configured by using either: –Windows 7 Local Security Policy For small environments –Group Policy For larger environments MCTS Guide to Microsoft Windows 738

UAC Configuration (cont’d.) MCTS Guide to Microsoft Windows 739

MCTS Guide to Microsoft Windows 740

Malware Protection Windows 7 includes the following features to protect computers from malware: –Windows Defender –Microsoft Security Essentials MCTS Guide to Microsoft Windows 741

Windows Defender –Antispyware software included with Windows 7 Spyware –Software that is silently installed on your computer, monitors your behavior, and performs actions based on your behavior Windows Defender provides two levels of protection: –On-demand scanning –Real-time scanning Scanning use signatures to identify spyware MCTS Guide to Microsoft Windows 742

Windows Defender (cont'd.) MCTS Guide to Microsoft Windows 743

Windows Defender (cont'd.) On-Demand Scanning –Windows Defender can perform ad hoc scanning When you suspect that spyware is present on your computer –Windows Defender can also perform scheduled scans Real-Time Scanning –Constantly monitors your computer and alerts you when spyware attempts to install –Better than on-demand scanning because you are preventing the problem rather than fixing it MCTS Guide to Microsoft Windows 744

Windows Defender (cont'd.) Real-Time Scanning (cont'd.) –Protects the following areas: Downloaded files and attachments Programs that run on my computer Windows Defender Alert Levels –Severe or High –Medium –Low MCTS Guide to Microsoft Windows 745

Windows Defender (cont'd.) Windows Defender Actions –When malware is detected, it can be quarantined, removed, or allowed –You can define default actions that are applied for severe, high, medium, and low alerts MCTS Guide to Microsoft Windows 746

Microsoft Security Essentials Viruses are a different type of software than spyware Some of the things viruses can do: –Send spam from your computer to the internet –Capture usernames and passwords for Web sites, including online banking –Steal enough personal information for identity theft –Allow others to remote control your computer and use it as a launching point for illegal activities Windows 7 does not include any software to protect your computer from viruses MCTS Guide to Microsoft Windows 747

Data Security NTFS permissions –Most basic level of data security in Windows 7 –Stop logged-on users from accessing files and folders that they are not assigned read or write permission to Relatively easy to work around NTFS permissions –When you have physical access to the computer To secure data on desktop computers and laptops, encryption is required –Windows 7 includes Encrypting File System (EFS) and BitLocker Drive Encryption MCTS Guide to Microsoft Windows 748

Encryption Algorithms Encryption makes data unreadable –Decryption makes data readable again Symmetric encryption –Same key to encrypt data and decrypt data –The key is a long number that is very hard to guess –Symmetric encryption is strong and fast Good for encrypting large volumes of data such as files –Used by both EFS and BitLocker Drive Encryption –Biggest problem is securing the key MCTS Guide to Microsoft Windows 749

Encryption Algorithms (cont'd.) MCTS Guide to Microsoft Windows 750

Encryption Algorithms (cont'd.) Asymmetric encryption –Uses two keys to encrypt and decrypt data Data encrypted by one key is decrypted by the other –Keys are part of a digital certificate –Digital certificates are obtained from certificate authorities –Requires more processing power and is less secure than symmetric encryption –Use symmetric encryption to encrypt the data and then use asymmetric encryption to protect just the symmetric key MCTS Guide to Microsoft Windows 751

Encryption Algorithms (cont'd.) MCTS Guide to Microsoft Windows 752

Encryption Algorithms (cont'd.) Hash encryption –One-way encryption It encrypts data, but the data cannot be decrypted –Used to uniquely identify data rather than prevent access to data –Sometimes hash values for data are called fingerprints –Used for storing passwords –When passwords are stored as only a hash value, it is impossible to decrypt the password MCTS Guide to Microsoft Windows 753

Encryption Algorithms (cont'd.) MCTS Guide to Microsoft Windows 754

Encrypting File System Encrypting File System (EFS) –First included with Windows 2000 Professional –Encrypts individual files and folders on a partition –Suitable for protecting data files and folders on workstations and laptops –Can also be used to encrypt files and folders on network servers File or folder must be located on an NTFS- formatted partition MCTS Guide to Microsoft Windows 755

Encrypting File System (cont'd.) MCTS Guide to Microsoft Windows 756

Encrypting File System (cont'd.) To use EFS, users must have a digital certificate with a public key and a private key –Windows 7 can generate one for you From the user perspective, encryption is a file attribute Files can also be encrypted using the command- line utility Cipher Lost encryption keys –If a user loses the EFS key, then an encrypted file is unrecoverable with the default configuration MCTS Guide to Microsoft Windows 757

Encrypting File System (cont'd.) MCTS Guide to Microsoft Windows 758

Encrypting File System (cont'd.) Lost encryption keys –Some ways EFS keys may be lost The user profile is corrupted The user profile is deleted accidentally The user is deleted from the system The user password is reset –In User Accounts, there is an option to manage file encryption certificates Allows you to view, create, and back up certificates –Creating a recovery certificate allows the files encrypted by all users to be recovered if required MCTS Guide to Microsoft Windows 759

Encrypting File System (cont'd.) Lost encryption keys (cont'd.) –Steps for creating and using a recovery certificate Create the recovery certificate Install the recovery certificate Update existing encrypted files Sharing Encrypted Files –Steps to work with encrypted files on multiple computers Encrypt the file on the first computer Export the EFS certificate, including the private key from the first computer MCTS Guide to Microsoft Windows 760

Encrypting File System (cont'd.) Sharing Encrypted Files (cont'd.) –Steps to work with encrypted files on multiple computers (cont'd.) Import the EFS certificate, including the private key on the second computer Open the encrypted file on the second computer –Steps to share encrypted files with other users Export the EFS certificate of the first user, but do not include the private key Import the EFS certificate of the first user into the profile of the second user as a trusted person Second user encrypts file and shares it with first user MCTS Guide to Microsoft Windows 761

Encrypting File System (cont'd.) Moving and Copying Encrypted Files –Encrypted files behave differently when copied or moved –Rules for moving and copying encrypted files An unencrypted file copied or moved to an encrypted folder becomes encrypted An encrypted file copied or moved to an unencrypted folder remains encrypted An encrypted file copied or moved to a FAT partition, FAT32 partition, or floppy disk becomes unencrypted –If you have access to decrypt the file MCTS Guide to Microsoft Windows 762

Encrypting File System (cont'd.) Moving and Copying Encrypted Files (cont'd.) –Rules for moving and copying encrypted files (cont'd.) If you do not have access to decrypt a file, then you get an access-denied error –If you attempt to copy or move the file to a FAT partition, FAT32 partition, or floppy disk MCTS Guide to Microsoft Windows 763

BitLocker Drive Encryption –Data encryption feature included with Windows 7 An entire volume is encrypted when you use BitLocker Drive Encryption –Also protects the operating system Designed to be used with a Trusted Platform Module (TPM) –Part of the motherboard in your computer and used to store encryption keys and certificates MCTS Guide to Microsoft Windows 764

BitLocker Drive Encryption (cont'd.) MCTS Guide to Microsoft Windows 765

BitLocker Drive Encryption (cont'd.) BitLocker Drive Encryption modes –TPM only –Startup key BitLocker Hard Drive Configuration –Hard drive must be divided into two partitions Encrypted partition: the operating system volume Unencrypted system partition: contains necessary files to boot the operating system MCTS Guide to Microsoft Windows 766

BitLocker Drive Encryption (cont'd.) BitLocker Encryption Keys –Volume Master Key (VMK) Encrypt data on the operating system volume –Full Volume Encryption Key (FVEK) Used to encrypt the VMK Recovering BitLocker-Encrypted Data –A recovery password is generated automatically –You can save it to a USB drive or folder, display on the screen, or print MCTS Guide to Microsoft Windows 767

BitLocker Drive Encryption (cont'd.) MCTS Guide to Microsoft Windows 768

BitLocker Drive Encryption (cont'd.) Recovering BitLocker-Encrypted Data (cont'd.) –Recovery password is required when the normal decryption process is unable to function –Most common reasons include: Modified boot files Lost encryption keys Lost or forgotten startup PIN Disabling BitLocker Drive Encryption –Decrypts all of the data on the hard drive and makes it readable again MCTS Guide to Microsoft Windows 769

BitLocker Drive Encryption (cont'd.) BitLocker To Go –Included with Windows 7 –Protects data on removable storage such as USB drives –Options for unlocking removable storage: Use a password to unlock the drive Use my smart card to unlock the drive MCTS Guide to Microsoft Windows 770

Windows Update Scheduling automatic updates with Windows Update –The most important security precaution you can take with Windows 7 When a Windows security flaw is found, the flaw is reported to Microsoft –Microsoft releases a patch to fix the problem Windows Update categories –Important –Recommended –Optional MCTS Guide to Microsoft Windows 771

Windows Update (cont'd.) MCTS Guide to Microsoft Windows 772

Windows Update (cont'd.) Windows Update settings –Install updates automatically (recommended) –Download updates but let me choose whether to install them –Check for updates but let me choose whether to download and install them –Never check for updates (not recommended) Microsoft Update is an alternative to Windows Update MCTS Guide to Microsoft Windows 773

Windows Update (cont'd.) MCTS Guide to Microsoft Windows 774

Windows Update (cont'd.) Windows Update process can be modified to use Windows Server Update Services (WSUS) –WSUS allows corporations to test patches before releasing them MCTS Guide to Microsoft Windows 775

Action Center –Control Panel applet that lets you quickly check important security settings in Windows 7 Settings monitored by Windows Security –Network Firewall –Windows Update –Virus protection –Spyware and unwanted software protection –Internet security settings –User Account Control –Network Access Protection MCTS Guide to Microsoft Windows 776

Windows Security Center (cont'd.) MCTS Guide to Microsoft Windows 777

Summary Windows 7 has new improved security features Windows 7 supports various security policies including local security and account policies Security templates can be used to configure or analyze Windows 7 security options Analyzing and applying security templates is done with Secedit or the Security Configuration and Analysis MMC snap-in Auditing is used to record specific operating system events to the security log MCTS Guide to Microsoft Windows 778

Summary (cont'd.) UAC increases security by allowing users to log on and perform their jobs with standard user accounts Windows Defender is antispyware software Microsoft Security Essentials is free antivirus software EFS protects individual files by encrypting them BitLocker Drive Encryption encrypts an entire partition Windows Update ensures that patches are applied to Windows 7 as they are made available MCTS Guide to Microsoft Windows 779